24小时热门版块排行榜    

查看: 497  |  回复: 1
本帖产生 1 个 翻译EPI ,点击这里进行查看
当前只显示满足指定条件的回帖,点击这里查看本话题的所有回帖

武汉一心一译

捐助贵宾 (著名写手)


【答案】应助回帖

商家已经主动声明此回帖可能含有宣传内容
★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ...
孙飞龙: 金币+50, 翻译EPI+1, 有帮助 2015-01-24 19:52:46
孙飞龙(RXMCDM代发): 金币+10 2015-01-25 02:02:11
Currently, the e-commerce, e-government affair system and financial and banking business are getting a momentum, therefore the security issue of e-commerce has become the focus of people’s attention. In order to ease the conflict between the difficulty of remembering the secret key and the randomness of secret key’s changement in e-commerce, as well as to solve insufficient relevance between secret key and users’ identity information, in this paper, based on the fingerprint feature processing technique of biometric features recognition, the fingerprint secrete key was generated and used in digital signature method.


Firstly, the paper analyzed the image processing method based on fingerprint detail recognition, however the fingerprint secrete key, generated according to the related fingerprint characteristic value by using this method, can hardly be valid due to problems including the differences of characteristic values of the same fingerprint, the uncertainty of length of characteristic values, and the possibility of faking or missing characteristic values.
As a result, this paper adopted the image processing method based on fingerprint texture


Secondly, this paper made research on a generated method of fake random fingerprint secrete key. This method can automatically modify and regenerate the initial secrete key, when the second-time input fingerprint characteristic value and initial characteristic value was from the same finger but different in values after the fingerprint secrete key was generated from characteristic value using fuzzy extraction technology. By integrating the generating method of fingerprint secrete key into the digital signature method, the security level of digital signature method can be effectively increased.

At last, by adopting the elliptic curve digital signature method, Hash function, and secrete key exchanging protocol, the fingerprint-based digital signature method was established, which was also demonstrated in terms of effectiveness through experiments. On this basis, in order to work out the key exposures of digital signature method, a strong forward security digital signature method was proposed and demonstrated in terms of effectiveness, security, and anti-fake property in this paper.

Through experiments, it shows that the digital signature method generated in the paper possesses a strong value theoretically and practically in e-commerce, financial and bank business.
2楼2015-01-23 18:26:28
已阅   回复此楼   关注TA 给TA发消息 送TA红花 TA的回帖
相关版块跳转 我要订阅楼主 孙飞龙 的主题更新
信息提示
请填处理意见